Viewing 15 posts - 421 through 435 (of 515 total)
Slightly off topic, but the author's point about developers loving GUIDs is spot on. After all, they are absolutely guaranteed to be unique keys. The problem, of course, is their...
September 15, 2011 at 7:15 am
djackson 22568 (9/12/2011)
roger.plowman (9/12/2011)
September 12, 2011 at 3:30 pm
I keep seeing the chest-pounding developers who claim if you don't know how to implement low-level structures in C (or equally low-level languages) that you're not a real developer/CS degree...
September 12, 2011 at 8:57 am
This thread is just another version of "should we promote certificates". 🙂
Having spent 30+ years in the industry as a jack-of-all-trades (master of none I admit) I've seen great self-taught/horrible...
September 9, 2011 at 7:15 am
Because our lot is pretty much exactly at capacity everyone has an assigned spot. However, my spot has been changed like 4 times since I worked there. Once it was...
September 1, 2011 at 7:28 am
My database design requires the use of bit fields, the majority of which will be false, and it would be nice to have a filtered index for bit fields that...
August 24, 2011 at 6:41 am
VERY nice. 🙂
One small quibble, you may want to look at Table 3, it looks like you have two rows labeled TABLE_CATALOG, the second should probably be TABLE_SCHEMA. Other than...
August 16, 2011 at 6:34 am
I thought the article had good information, but perhaps more attention could have been paid to the characteristics of a good key, bringing up the whole surrogate key idea--unless that's...
August 3, 2011 at 6:51 am
Due to the extreme flexibility requirements of our reporting system users need at least a nodding acquaintence with the database schema--primarily how specific data can be found in specific tables,...
July 28, 2011 at 7:08 am
BenWard (7/20/2011)
Toreador (7/20/2011)
BenWard (7/20/2011)
don't forget, if this question - or it's answer - was actually wrong it wouldn't have been published.
Sadly that's not the case. There have been many recent...
July 20, 2011 at 6:56 am
Auditing data access I would think is near impossible to scale.
For example, the ideal situation would log every record's access by every individual who accesses it, presumably with a datetime...
June 24, 2011 at 7:08 am
However, in my mind, the age of the OS isn't an issue. If the OS still works for you, there's no problem running it.
Well, hey, why the heck doesn't MS...
June 23, 2011 at 6:55 am
We talk as if we know what security is, and this is a grave mistake. Sure, for any given problem we know how to secure against it.
The problem is, security...
June 22, 2011 at 7:06 am
I've been in the business over 30 years and am something of a jack of all trades (and yes, a master of almost none 🙂 ). I used to work...
June 6, 2011 at 6:54 am
So to sum it up, this is about understanding what the user wants, having the time to implement it, test it, and prepare for the inevitable scaling and utter reversal...
May 25, 2011 at 7:02 am
Viewing 15 posts - 421 through 435 (of 515 total)